Source Code Plagiarism Detection in an Educational Context: A Literature Mapping

被引:6
作者
Aniceto, Rodrigo C. [1 ]
Holanda, Maristela [1 ]
Castanho, Carla [1 ]
Da Silva, Dilma [2 ]
机构
[1] Univ Brasilia, Brasilia, DF, Brazil
[2] Texas A&M Univ, College Stn, TX USA
来源
2021 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2021) | 2021年
关键词
programming; plagiarism detection; source code; academia; education; similarity; mapping; SIMILARITY DETECTION; DETECTION TOOL; EFFICIENT; MODEL;
D O I
10.1109/FIE49875.2021.9637155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detection of plagiarism in students' source codes in college-level programming courses is an important topic for instructors and institutions that seek to pursue project-based learning while enforcing honor codes and maintaining traditional grade-based skill assessment methods. There are different approaches for plagiarism detection currently being researched. This paper aims to answer the question: What does the literature report on source code plagiarism detection in university settings? To answer that, we used a systematic mapping process of recent literature. We selected 109 papers published between 2015 and 2020 that deal with this subject specifically in an educational context. We found that this research area is currently expanding and being studied worldwide. There were papers from 37 different countries, and the number of publications per year has been increasing since 2017. The most targeted programming languages are Java, C++, C, and Python. The most studied plagiarism detection tools are MOSS, JPlag, SIM, Plaggie, and Sherlock. Our study also identified new methodologies created to tackle this problem, such as the analysis of students' typing patterns or their coding style. We noticed that the proposed solutions are mainly based on static source code analysis instead of following the development process. This paper describes our findings.
引用
收藏
页数:9
相关论文
共 112 条
[1]  
Agrawal M, 2016, PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), P236, DOI 10.1109/NGCT.2016.7877421
[2]  
Agrawal Mayank, 2020, 2020 8 INT C RELIABI, DOI [10.1109/icrito48877.2020.9197972, DOI 10.1109/ICRITO48877.2020.9197972]
[3]  
Agrawal Mayank, 2016, 2016 IEEE UTTAR PRAD, DOI [10.1109/upcon.2016.7894676, DOI 10.1109/UPCON.2016.7894676]
[4]   A Comparison of Three Popular Source code Similarity Tools for Detecting Student Plagiarism [J].
Ahadi, Alireza ;
Mathieson, Luke .
PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTING EDUCATION CONFERENCE (ACE 2019), 2019, :112-117
[5]  
Aldabbas Hamza, 2019, J THEORETICAL APPL I, V97, P4723
[6]   Sherlock N-overlap: Invasive Normalization and Overlap Coefficient for the Similarity Analysis Between Source Code [J].
Allyson, Franca B. ;
Danilo, Maciel L. ;
Jose, Soares M. ;
Giovanni, Barroso C. .
IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (05) :740-751
[7]  
ANDRADE R, 2018, P 20 INT C ENT INF S, P517, DOI [10.5220/0006668705170524, DOI 10.5220/0006668705170524]
[8]  
Andrianov I, 2020, PROC CONF OPEN INNOV, P16, DOI [10.23919/FRUCT48808.2020.9087465, 10.23919/fruct48808.2020.9087465]
[9]  
[Anonymous], 2017, IAENG International Journal of Computer Science, V44, P501
[10]  
[Anonymous], PLAGIARISM